Scalable Automated Adversary Emulation Platform
-
Updated
Oct 30, 2020 - Python
{{ message }}
Scalable Automated Adversary Emulation Platform
Utilities for MITRE™ ATT&CK
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
The GitHub of Adversary Emulation Plans in JSON. Share SCYTHE threats with the community. #ThreatThursday adversary emulation plans are shared here.
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
One year study plan to develop an intermediate level knowledge of red teaming and adversary emulation
A CALDERA plugin
Red team infrastructure resources
Foomur's solutions to the labs from the SpecterOps course - Adversary Tactics - Powershell
This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense
Add a description, image, and links to the adversary-emulation topic page so that developers can more easily learn about it.
To associate your repository with the adversary-emulation topic, visit your repo's landing page and select "manage topics."